thomasetheridge

Managed Threat Hunting Meets the Challenge of the Tenacious Adversary
2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow’s Adversaries
’Tis the Season for eCrime
CrowdStrike and NIST 800-53: Now That’s What I Call a “Twofer”
The Wand Is Only as Good as the Magician: Getting the Most From Prevention Tools
Getting the Bacon from the Beacon
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware
Investigating PowerShell: Command and Script Logging